Get a free application, infrastructure and malware scan report - Scan Your Website Now

Indusface Blog

Calender IconJuly 21, 2016
Clock Icon 4 min Read
Application Layer 7 DDoS Attack Protection

DDoS attack as an operational problem. They try hard to prove that it’s not their fault and completely overlook the emotional aspects that a company

Read More...
Calender IconJuly 12, 2016
Clock Icon 2 min Read
31 Google URLs Vulnerable to Open Redirect

Do you remember the last time we discussed OWASP A10- Invalidated Redirects and Forwards? It was our OWASP educative series and we helped you understand

Read More...
Calender IconJuly 5, 2016
Clock Icon < 1 min Read
Major Cyber Security Numbers – 2016

Sources: Identity Theft Resource Center Data Breach Investigations Report Indusface Research …

Read More...
Calender IconJune 21, 2016
Clock Icon 3 min Read
We Asked 6 Random Cybersecurity Questions

cybersecurity questions to few of our readers and cybersecurity experts. Here are a few of them. Question 1 to Kevin Du, Senior Member at the Institute

Read More...
Calender IconJune 7, 2016
Clock Icon 4 min Read
Ecommerce Website Security Best Practices

ecommerce websites receive anywhere from 200 million to 2 billion visitors in a year. Of course, that is huge when compared to a startup ecommerce website

Read More...
Calender IconMay 31, 2016
Clock Icon 2 min Read
CSV Injection with CVS Export Feature

Banking, ecommerce, and a number of other websites increasingly offer spreadsheet export functionality within their applications to help users download .XLS and .CSV but did you know of the CSV Injection risks?

Read More...
Calender IconMay 24, 2016
Clock Icon 6 min Read
93 Small Business CyberSecurity Guide

How do you secure website from hackers? Look at some of the expert tips and ensure that hackers stay away from you and your customers.

Read More...
Calender IconMay 17, 2016
Clock Icon 5 min Read
My DDoS Story

What is a DDoS? How to stop it? Learn what happened at Fishery of Randomland and how Frank survived a distributed denial of service attack on his website.

Read More...
Calender IconMay 4, 2016
Clock Icon 3 min Read
The End of Application Security As You Know It

The current ‘automating everything’ approach for application security shouldn’t be just replaced. It should be buried down under for greater good.

Read More...
Calender IconApril 26, 2016
Clock Icon 4 min Read
What Your Web App Security Had Been Missing?

With rising number of security lapses, the question is inevitable. While many companies understand the importance and need of proper web application security infrastructure, they do not know where to look for it.

Read More...
Calender IconApril 14, 2016
Clock Icon 2 min Read
‘Badlock’ Bug: Everything You Need to Know

Badlock is referenced for Microsoft Windows by CVE-2016-0128 / MS16-047 (Windows SAM and LSAD Downgrade Vulnerability) and for Samba by CVE-2016-2118 (SAMR and LSA man in the middle attacks possible).

Read More...
Calender IconApril 7, 2016
Clock Icon 4 min Read
Why Should Startups Endure Continuous Data Breaches?

In 1996, nine years after the launch of the World Wide Web Project, number of websites had grown to two hundred thousand with a growth of almost 1000% from the last year. People started thinking of getting their business online.

Read More...
Managed WAF

AppTrana

Fully Managed SaaS-Based Web Application Security Solution

Get free access to Integrated Application Scanner, Web Application Firewall, DDoS & Bot Mitigation, and CDN for 14 days

Get Started for Free Request a Demo

Gartner

Indusface is the only cloud WAAP (WAF) vendor with 100% customer recommendation for 4 consecutive years.

A Customers’ Choice for 2024, 2023 and 2022 - Gartner® Peer Insights™

The reviews and ratings are in!